Endpoint
Path Parameters
The ID of the client/service. This identifies which service configuration to retrieve.Example:
packet-delivery-portalOverview
This endpoint returns the OpenID Provider metadata for a specific service, allowing clients to discover the configuration and capabilities of the authorization server dynamically. This eliminates the need for hard-coding endpoint URLs and supported features.The OpenID Configuration endpoint is publicly accessible and does not require authentication. It’s designed to enable automatic discovery of the provider’s capabilities.
Response
The endpoint returns an OpenID Provider Metadata object conforming to the OpenID Connect Discovery specification.Response Schema
The issuer identifier URL. This must be identical to the value used in issued tokens.Example:
https://api-test.ebsi.eu/authorisation/v4URL of the OAuth 2.0 Authorization Endpoint where authorization requests are sent.Example:
https://api-test.ebsi.eu/authorisation/v4/authorizeURL of the OAuth 2.0 Token Endpoint where token requests are sent.Example:
https://api-test.ebsi.eu/authorisation/v4/tokenURL of the endpoint that provides presentation definitions for credential verification.Example:
https://api-test.ebsi.eu/authorisation/v4/presentation-definitionsURL of the JSON Web Key Set (JWKS) endpoint containing the provider’s public keys.Example:
https://api-test.ebsi.eu/authorisation/v4/jwksArray of OAuth 2.0 scope values that this server supports.Example:
["openid", "didr_invite", "didr_write", "tir_invite", "tir_write"]Array of OAuth 2.0 response_type values that this server supports.Example:
["token", "code"]Array of OAuth 2.0 response_mode values that this server supports.Example:
["query", "fragment"]Array of OAuth 2.0 grant type values that this server supports.Example:
["vp_token", "authorization_code"]Array of Subject Identifier types that this server supports.Example:
["public"]Array of JWS signing algorithms (alg values) supported for ID Tokens.Example:
["ES256", "RS256"]Array of JWS signing algorithms (alg values) supported for Request Objects.Example:
["ES256", "RS256"]Boolean value indicating whether the provider supports use of the
request parameter.Example: trueArray of client authentication methods supported by the token endpoint.Example:
["private_key_jwt", "client_secret_basic"]Response Examples
Service-Specific Configuration
Each service registered with the VCVerifier can have its own OpenID configuration. Theservice_id path parameter determines which service’s configuration is returned.
Make sure to use the correct
service_id that matches your registered service. Using an invalid service ID will result in an error.Grant Types
The VCVerifier supports several OAuth 2.0 grant types:Verifiable Presentation Token
Authorization Code
Token Exchange
Usage Pattern
Clients should fetch the OpenID Configuration at startup or cache it appropriately:Error Responses
If the service ID is not found or configuration generation fails:Related Endpoints
- JWKS Endpoint - Retrieve public keys for JWT verification
- Authorization Endpoint - Start the authorization flow
- Token Endpoint - Exchange codes for access tokens